Bruteforcing with Burp Suite: how to set up the Payload

Greeting Everyone,
I am in the process of verifying a Vulnerability on one of my companies’ websites and needs a bit of help with it ( see screen shot below). I used burp suite to crawl the website, used the Scanner, and sent the  results to the intruder function to verify the brute force Vulnerability ….. I changed the attack type to “cluster bomb” and went to “clear” the presets (highlighted in Orange) .. But I am not for sure how to reset for the “wrap_username=$Admin$”, “wrap_password=$anypasswords”, and Login (do not see syntax to on the following post.) Could somebody point me in the right direction on how to set the following parameters for the username, password, and login to complete the brute force task

BurpSuite Payload Screenshot
Who is Participating?
btanConnect With a Mentor Exec ConsultantCommented:
maybe catch see this walk through example starting where it starts the intercept and submit to intruder to build the position...The tool should automatically created payload positions for us. The payload positions are defined using the § character, the intruder will replace the value between two § characters (
MikeSecurityAuthor Commented:
thanks for the help
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.